BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
SocGholish Malware Exploits BOINC Project for Covert Cyberattacks
/in General NewsThe JavaScript downloader malware known as SocGholish (aka FakeUpdates) is being used to deliver a remote access trojan called AsyncRAT as well as a legitimate open-source project called BOINC.
BOINC, short for Berkeley Open Infrastructure Network Computing Client, is an open-source “volunteer computing” platform maintained by the University of California with an aim to carry out “large-scale
The Hacker News – Read More
Fake CrowdStrike Fixes Target Companies With Malware, Data Wipers
/in General NewsMalicious campaigns have emerged, including one targeting BBVA bank customers with a fake CrowdStrike Hotfix that installs remote access tools. Another attack involves a data wiper distributed under the guise of a CrowdStrike update.
Cyware News – Latest Cyber News – Read More
China Claims Volt Typhoon was a False Flag Inside Job Conspiracy
/in General NewsBeijing has claimed that the Volt Typhoon attack gang, accused by Five Eyes nations of being a Beijing-backed threat to critical infrastructure, was actually fabricated by the US intelligence community.
Cyware News – Latest Cyber News – Read More
CISA Says Malicious Hackers are ‘Taking Advantage’ of CrowdStrike Outage
/in General NewsThe U.S. cybersecurity agency CISA warned against clicking on suspicious links to prevent email compromise. Cybercriminals are already impersonating CrowdStrike in phishing emails, asking for payment to “fix the CrowdStrike apocalypse.”
Cyware News – Latest Cyber News – Read More
Under-Resourced Maintainers Pose Risk to Africa’s Open Source Push
/in General NewsMany nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply chain attacks highlight the need for security.
darkreading – Read More
New Linux Variant of Play Ransomware Targeting VMWare ESXi Systems
/in General NewsCybersecurity researchers have discovered a new Linux variant of a ransomware strain known as Play (aka Balloonfly and PlayCrypt) that’s designed to target VMWare ESXi environments.
“This development suggests that the group could be broadening its attacks across the Linux platform, leading to an expanded victim pool and more successful ransom negotiations,” Trend Micro researchers said in a
The Hacker News – Read More
Fake Hot Fix for CrowdStrike ”crowdstrike-hotfix.zip” Spreads Remcos RAT
/in General NewsBeware “crowdstrike-hotfix.zip”! This fake file spreads Remcos malware, targeting LatAm CrowdStrike users. Don’t download it! Learn how to…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Beware Grand Theft Auto Fans! Fake GTA VI Beta Download Spreads Malware
/in General NewsGrand Theft Auto VI fans beware of Fake GTA VI Beta download ads! Don’t get scammed by fake…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Microsoft Says 8.5 Million Windows Devices Impacted by CrowdStrike Incident, Publishes Recovery Tool
/in General NewsMicrosoft says roughly 8.5 million Windows devices were impacted by the faulty software update from CrowdStrike, and published a tool to help admins through the recovery process.
The post Microsoft Says 8.5 Million Windows Devices Impacted by CrowdStrike Incident, Publishes Recovery Tool appeared first on SecurityWeek.
SecurityWeek – Read More
Want to be an IT pro? Here are 4 ways to look like a great job candidate
/in General NewsCompanies aren’t just looking for people with strong tech aptitude. Attitude matters, too, say business leaders.
Latest news – Read More